Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33470: CWE-862: Missing Authorization in blakeblackshear frigate

0
Medium
VulnerabilityCVE-2026-33470cvecve-2026-33470cwe-862cwe-863
Published: Thu Mar 26 2026 (03/26/2026, 17:06:55 UTC)
Source: CVE Database V5
Vendor/Project: blakeblackshear
Product: frigate

Description

Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. In version 0.17.0, a low-privilege authenticated user restricted to one camera can access snapshots from other cameras. This is possible through a chain of two authorization problems: `/api/timeline` returns timeline entries for cameras outside the caller's allowed camera set, then `/api/events/{event_id}/snapshot-clean.webp` declares `Depends(require_camera_access)` but never actually validates `event.camera` after looking up the event. Together, this allows a restricted user to enumerate event IDs from unauthorized cameras and then fetch clean snapshots for those events. Version 0.17.1 fixes the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 17:32:47 UTC

Technical Analysis

Frigate is an open-source network video recorder (NVR) designed for real-time local object detection on IP cameras. In version 0.17.0, a security vulnerability identified as CVE-2026-33470 arises from missing authorization checks in two API endpoints. First, the /api/timeline endpoint improperly returns timeline entries for cameras beyond the authenticated user's permitted camera set, allowing enumeration of event IDs from unauthorized cameras. Second, the /api/events/{event_id}/snapshot-clean.webp endpoint, which is supposed to enforce camera access restrictions via a dependency on require_camera_access, fails to validate the camera associated with the requested event after event lookup. This authorization bypass enables a low-privilege user, restricted to a single camera, to access clean snapshots of events from other cameras they should not have access to. The vulnerability impacts confidentiality by exposing sensitive video snapshots but does not affect data integrity or system availability. Exploitation requires authenticated access with low privileges but no additional user interaction. The flaw is categorized under CWE-862 (Missing Authorization) and CWE-863 (Incorrect Authorization). The issue was publicly disclosed on March 26, 2026, with a CVSS v3.1 base score of 6.5 (medium severity), reflecting network attack vector, low attack complexity, and high confidentiality impact. The vendor addressed the vulnerability in Frigate version 0.17.1 by correcting the authorization logic to properly restrict access to event snapshots based on camera permissions.

Potential Impact

This vulnerability primarily compromises the confidentiality of video surveillance data by allowing unauthorized users to access snapshots from cameras they are not permitted to view. For organizations relying on Frigate for security monitoring, this could lead to exposure of sensitive visual information, potentially revealing private or proprietary activities, compromising physical security, or violating privacy regulations. Although the vulnerability does not affect data integrity or availability, the unauthorized disclosure of video snapshots can have serious reputational, legal, and operational consequences. Attackers with low-level credentials could exploit this flaw to gather intelligence or conduct surveillance without detection. The impact is especially critical in environments with strict access controls or sensitive surveillance deployments, such as corporate offices, critical infrastructure, or government facilities. Since exploitation requires authentication but no user interaction, insider threats or compromised low-privilege accounts pose a significant risk.

Mitigation Recommendations

Organizations using Frigate version 0.17.0 should immediately upgrade to version 0.17.1 or later, where the authorization checks have been properly implemented. In addition to patching, administrators should audit user permissions to ensure that camera access is correctly restricted and monitor logs for unusual access patterns to event snapshots. Implementing multi-factor authentication (MFA) for user accounts can reduce the risk of credential compromise. Network segmentation and limiting access to the Frigate management interface to trusted networks can further reduce exposure. Regular security assessments and penetration testing should include verification of authorization controls on API endpoints. If upgrading is temporarily not possible, consider restricting access to the affected API endpoints via firewall rules or reverse proxy access controls to prevent unauthorized enumeration and snapshot retrieval.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-20T16:16:48.969Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c569d6f4197a8e3be94d95

Added to database: 3/26/2026, 5:16:06 PM

Last enriched: 3/26/2026, 5:32:47 PM

Last updated: 3/26/2026, 6:03:18 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses